ANALYSIS OF VARIOUS AUTHENTICATION ALGORITHMS IN WIRELESS SENSOR NETWORKS
Abstract
With the passing challenging years there is an advancement in technology from wireless communication networks to wireless sensor networks. These sensor nodes are capable of exchanging information using radio singles. Collection of hundreds of thousands of such sensor nodes are typically defined as wireless sensor networks. Wireless sensor nodes are placed unattended, in open social environment to monitor environmental and physical conditions. They are adaptable to maintain vast range of functions. In this work various attacks, authentication algorithms, and their comparison has been discussed. It has been observed that RSA algorithm reside on the key size and the significance of the exponent, ECC resides on the key size and the type of algorithm. whereas hash, due to its compressed output it computes fast operations.
Keywords
WSN, sensors, networks, nodes, attacks, authentication, algorithms.
Full Text:
PDFDOI: https://doi.org/10.26483/ijarcs.v8i5.3965
Refbacks
- There are currently no refbacks.
Copyright (c) 2017 International Journal of Advanced Research in Computer Science

